Cisco ASA - Route Traffic to Specific Interface

I have a Cisco ASA 5510 that is protecting 2 WAN connections for my business (Detailed diagram attached). 1 WAN connection goes to the public Internet. The other WAN connection goes to our corporate network, which also provides access to the Internet

Internally, I use a proxy server to guide proper traffic from workstations to the corporate network, so essentially, all traffic to the corporate network comes from one device. We need to route some Internet-accessible addresses through the corporate network for access-control and monitoring reasons.

What is the best way to force all traffic from my proxy server to route properly over the corporate network interface?

The ASA is running v8.3(2). I have tried a reverse-NAT for the corporate router, access-control rules, and a thousand other things. I'm totally fried and at a loss. Thanks for the help!network.jpg

Selecting the right managed security services platform to grow your business can be a huge undertaking. Join WatchGuard and Frost & Sullivan in an upcoming webinar as we dive into the key elements of selecting a vendor platform and partnership to fuel a successful MSSP business.

The corporate router will receive traffic that may be Internet-routable as well, which is why it needs to be forced through that interface. We access some destinations which are locked down to the company's Internet gateway, not our local one. This is why I use the proxy server to concentrate all the traffic.

Each password manager has its own problems in dealing with certain websites and their login methods. In Part 1, I review the Top 5 Password Managers that I've found to be the best.
In Part 2 we'll look at which ones co-exist together and why it'…

As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’
As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data.
But that feeling is fleeting. Attacks these days can happen in many w…